International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 130 | Views: 194

Research Paper | Computer Science & Engineering | Iraq | Volume 3 Issue 7, July 2014


Color Image Encryption and Decryption Based Pixel Shuffling with 3D Blowfish Algorithm

Asia Mahdi Naser Alzubaidi [3] | Noor Dhia Kadhm Al-Shakarchy [5]


Abstract: In recent years, With the wide development in communications networks and applied the e-government in most field depending on the internet and its technologies, with the development in the hackers ability to intruder the communication channels. Consequently, cryptographic techniques are required to accomplish a sufficient level of security, integrity, confidentiality as well as, to prevent unauthorized users from accessing of important information during storage, recovery and transmission of data. To meet this challenges, a novel and efficient color image encryption method depending on the diffusion and confusion mechanesim presented in this papper. a permutation manner existing by 2D Arnold cat map transform with row_colunm wise methods to make more distortion of the relationship among connected pixels of original image by hide the statistical structure of pixels. Moreover, the proposed method applied a blowfish algorithm on image to presented confusion and diffusion on it with 3D logistic mapping in order to diffuse the relation between plain and encrypted images by changing the gray value of original image pixels. The strongest of Encryption algorithm is evaluated dependent on the relation between the plain and cipher image must be contradicting by hiding the natural feature of image. Also, the algorithm in this study has been tested on some images and showed good results. These results evaluated using security and statistical analysis such as Entropy function, NPCR and UACI Factors with the degree of randomness.


Keywords: 3D Blowfish Algorithm, 2D Arnold cat map, Image encryption Techniques, 3D Logistic Map, Row-Column Wise method


Edition: Volume 3 Issue 7, July 2014,


Pages: 336 - 343


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top